暂无分享,去创建一个
Yevgeniy Vorobeychik | Ayan Chakrabarti | Shaojie Wang | Jinghan Yang | Ning Zhang | Mingyang Xie | Manav Kulshrestha
[1] J. Friedrich,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Banking and Bookkeeping , 2022 .
[2] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[3] Shijian Lu,et al. Spatial Fusion GAN for Image Synthesis , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[5] A. Piva. An Overview on Image Forensics , 2013 .
[6] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[7] Bolei Zhou,et al. Places: A 10 Million Image Database for Scene Recognition , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[9] Yu Qiao,et al. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.
[10] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[11] Xuelong Li,et al. Robust Discrete Spectral Hashing for Large-Scale Image Semantic Indexing , 2015, IEEE Transactions on Big Data.
[12] Deen Freelon,et al. Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017 , 2019, Proceedings of the National Academy of Sciences.
[13] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[14] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[15] Scott McCloskey,et al. Detecting GAN-generated Imagery using Color Cues , 2018, ArXiv.
[16] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[17] Enhua Wu,et al. Squeeze-and-Excitation Networks , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Justus Thies,et al. Headon , 2018, ACM Trans. Graph..
[19] Andrew C. Gallagher,et al. Understanding images of groups of people , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[20] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[21] Philip S. Yu,et al. Deep Visual-Semantic Hashing for Cross-Modal Retrieval , 2016, KDD.
[22] Yevgeniy Vorobeychik,et al. Optimal randomized classification in adversarial settings , 2014, AAMAS.
[23] Anderson Rocha,et al. Illuminant-Based Transformed Spaces for Image Forensics , 2016, IEEE Transactions on Information Forensics and Security.
[24] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[25] Yi Fang,et al. Variational Deep Semantic Hashing for Text Documents , 2017, SIGIR.
[26] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[27] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[28] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[29] Bolin Chen,et al. Fake Faces Identification via Convolutional Neural Network , 2018, IH&MMSec.
[30] Jacob N. Shapiro,et al. Content-based features predict social media influence operations , 2020, Science Advances.
[31] Geoffrey E. Hinton,et al. Semantic hashing , 2009, Int. J. Approx. Reason..
[32] Nasir Memon,et al. Digital Image Forensics: There is More to a Picture than Meets the Eye , 2012 .
[33] Patrick Pérez,et al. State of the Art on Monocular 3D Face Reconstruction, Tracking, and Applications , 2018, Comput. Graph. Forum.
[34] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] B. S. Manjunath,et al. Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[36] Chuang Gan,et al. Sparse, Smart Contours to Represent and Edit Images , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[37] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[38] Jeff Donahue,et al. Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.
[39] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[40] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[41] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.